Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Can Threat Modeling Really Help Fight Cyber Burnout?
Cyber burnout is a real thing. What it is? What exactly is cyber burnout or cyber fatigue? According to Stacy Thayer, speaking at blackhat 2022...
How Threat Modeling is Being Reinvented Today
Threat modeling actually goes back further than you might think. Depending on what you choose as the starting point for the first threat model, you...
DevSecOps Engineer: An Emerging Cybersecurity Career Path
With more and more organizations relying on cloud-based tools to fuel their digital transformation projects and drive future growth, quickly...
DevSecOps and the Evolution of Threat Modeling
Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security threats...
Why it’s Important to Build a Threat Modeling Culture
There’s a difference between building a threat model and creating a threat modeling culture. To be sure one is part of the other, but to understand...
How to create and manage a rock-solid DevSecOps framework
Security has long been treated as an afterthought in software development. Developers work to create effective code but only consider software...
A New Type of Cryptomining Attack Aims to Hijack Network Bandwidth
Researchers on Tuesday found a new type of crypto-mining attack in the wild that’s designed to hijack network bandwidth. Read the full article here If...
A Case for Automated Threat Modeling
Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According...
A Glimpse Into the Future of Threat Modeling
Like everything else in the world of cybersecurity, threat modeling tools and practices continue to evolve. How is threat modeling evolving? There are...